Skip to content
SecBytes

SecBytes

A security blog for all!

 
  • Home
  • Sumit Shrivastava (@invad3rsam)
  • Contact Me

Month: May 2017

Getting system access using malicious word file

Sumit
May 23, 2017

Microsoft Office Word / Wordpad remote code execution vulnerability allows a remote attacker to execute arbitrary […]

Log In

Recent Posts

  • Blocking Ads on Your Home Network
  • Lab Solution: Me and My Girlfriend 1
  • Capturing NTLM Hashes using Bettercap
  • Getting system access using malicious word file
  • Shielding your browsing activities from the watchdogs

Categories

Archives

  • August 2020
  • January 2020
  • December 2018
  • May 2017
  • December 2016
  • October 2016

SecBytes

  • GitHub
  • Twitter
  • Facebook
RSS Security Tip of the Day
  • How to Decorate Your Bedroom? June 29, 2022
    Out of all the rooms in one’s house, the bedroom holds great importance as it’s the only space where one feels most comfortable and relaxed. A bedroom is a place… The post How to Decorate Your Bedroom? appeared first on Colbert On Demand.
    Richard
Legal
  • Disclaimer
  • Privacy Policy
  • Cookie Policy
Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

SecBytes | Proudly Powered by WordPress
Theme by Grace Themes